Information security applications = ...
WISA (Workshop : Information security) (2021 :)

FindBook      Google Book      Amazon      博客來     
  • Information security applications = 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security applications/ edited by Hyoungshick Kim.
    其他題名: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021 : revised selected papers /
    其他題名: WISA 2021
    其他作者: Kim, Hyoungshick.
    團體作者: WISA (Workshop : Information security)
    出版者: Cham :Springer International Publishing : : 2021.,
    面頁冊數: xi, 291 p. :ill. (chiefly col.), digital ;24 cm.
    內容註: Machine Learning Security -- LOM: Lightweight classifier for obfuscation methods -- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection -- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks -- On the robustness of intrusion detection systems for vehicles against adversarial attacks -- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems -- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments -- Research on improvement of anomaly detection performance in industrial control systems -- Cryptography -- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem -- Anonymous IBE from PEKS : A Generic Construction -- Secure Computation of Shared Secrets and Its Applications -- Pattern Matching over Encrypted Data with a Short Ciphertext -- Efficient adaptation of TFHE for high end-to-end throughput -- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling -- Hardware Security -- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers -- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor -- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms -- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors -- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks -- Application Security -- Adaptive Network Security Service Orchestraction based on SDN/NFV -- A General Framework for Matching Pattern Hiding in Deep Packet Inspection -- A Privacy-Preserving Payment Model for EV Charging -- Measuring Healthcare Data Breaches -- BadASLR: Exceptional cases of ASLR aiding Exploitation.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-030-89432-0
    ISBN: 9783030894320
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9410086 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 W57 2021 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入